Show plain JSON{"id": "CVE-2017-8116", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 10.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 3.9}]}, "published": "2017-07-03T16:29:00.557", "references": [{"url": "https://github.com/nettitude/metasploit-modules/blob/master/teltonika_add_user.rb", "tags": ["Exploit", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://github.com/nettitude/metasploit-modules/blob/master/teltonika_cmd_exec.rb", "tags": ["Exploit", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://labs.nettitude.com/blog/cve-2017-8116-teltonika-router-unauthenticated-remote-code-execution/", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://github.com/nettitude/metasploit-modules/blob/master/teltonika_add_user.rb", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://github.com/nettitude/metasploit-modules/blob/master/teltonika_cmd_exec.rb", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://labs.nettitude.com/blog/cve-2017-8116-teltonika-router-unauthenticated-remote-code-execution/", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-78"}]}], "descriptions": [{"lang": "en", "value": "The management interface for the Teltonika RUT9XX routers (aka LuCI) with firmware 00.03.265 and earlier allows remote attackers to execute arbitrary commands with root privileges via shell metacharacters in the username parameter in a login request."}, {"lang": "es", "value": "La interfaz administrativa para los routers RUT9XX de Teltonika (tambi\u00e9n se conoce como LuCI) con firmware versi\u00f3n 00.03.265 y anteriores, permite a atacantes remotos ejecutar comandos arbitrarios con privilegios root por medio de metacaracteres shell en el par\u00e1metro username en una petici\u00f3n de inicio de sesi\u00f3n."}], "lastModified": "2025-04-20T01:37:25.860", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:teltonika:rut900_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8C23F232-784F-43BA-88CA-98A288FD5C2B", "versionEndIncluding": "00.03.265"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:teltonika:rut900:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D9D1E794-1212-43CC-BA30-551EE45FA646"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:teltonika:rut905_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "323FAF90-F8A2-4FFE-B79A-08CB7B56BF73", "versionEndIncluding": "00.03.265"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:teltonika:rut905:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8C45D7FA-FA7F-426C-9905-D6A6ACBE8AC1"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:teltonika:rut950_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AAE86264-F281-42DA-AA35-B6964E430684", "versionEndIncluding": "00.03.265"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:teltonika:rut950:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4CE17C85-9A69-41FB-AB96-0DCAB72309A0"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:teltonika:rut955_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DF39D487-2CD1-4E9E-8323-6C5764B42B8B", "versionEndIncluding": "00.03.265"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:teltonika:rut955:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6F29C3F1-DFAF-433A-8B1E-4BD2A8DF6C1E"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}